/
Arcane Rituals for Cryptography Performance Optimization Arcane Rituals for Cryptography Performance Optimization

Arcane Rituals for Cryptography Performance Optimization - PowerPoint Presentation

jane-oiler
jane-oiler . @jane-oiler
Follow
420 views
Uploaded On 2017-03-25

Arcane Rituals for Cryptography Performance Optimization - PPT Presentation

The Council of Shadows Brown University Presented by Edward Tremel Computational Archaeologist A Mysterious Disappearance Setting Providence two years ago CS research group vanishes without trace ID: 529312

human elder group securityoften elder human securityoften group ill math computation providence abyss results stable magic efficiency basement sacrifice

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Arcane Rituals for Cryptography Performa..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Arcane Rituals for Cryptography Performance Optimization

The Council of Shadows

Brown University

Presented by Edward

Tremel

,

Computational ArchaeologistSlide2

A Mysterious Disappearance

Setting: Providence, two years ago

CS research group vanishes without trace

Mysterious events surround disappearanceRain of bloodUnexplainable earthquakeSlide3

Investigation Leads to Puzzling Discovery

Document Fell Behind File Cabinet in Disused CIT BasementSlide4

The Ill-Fated Group’s Results?

Brown faculty deny existence of Council of Shadows

No such project ever funded

Results appear publishableSlide5

Search For Lost Archive Leads To Long-Abandoned Tunnel

Reached Beneath Basement of University HallSlide6

A Discovery of Ill Portent

Bricked up within building’s walls

Bound in human skin

Aura of corruptionObscure and forbidding runesSlide7

The Problem With Cryptography

Must sacrifice efficiency for security

Often does not scale

Fundamental operations involve difficult computationOptimizing math libraries a thankless taskSlide8

Black Magic: The Solution?

Instead, sacrifice the blood of the innocent for both efficiency and security

Often suggested in theory, but impossible in practice until book’s discovery

Detailed instructions for ritualsSlide9

Gathering the Materials

3 human hearts

2 pounds flesh

Extract of NightshadeAura of PestilenceStone carved with Elder SignDefiled altar of the Elder Gods1 goatSlide10

The Horrifying Experiment

Unsuccessful attempts

Required additional grave robbing

Accidentally summoned disgusting tentacle monsterSome incantations granted power, but too unstable to useSlide11

Exploiting the Dark Arts

Success: opened stable portal to plane of Elder Gods

Black magic used to solve modular exponentiation

Arcane forces allowed impossibly fast computationSlide12

Corruption-Based Computation

Low-level math library constructed with diabolical forces

ModExp

, Group ops, Field ops, Elliptic Curve pairingsChannel to Abyss used for source of true randomnessSlide13

Promising ResultsSlide14

But At What Cost?

Channel to Abyss may not be as stable as originally thought

Chaos leaking into mortal plane

Increased incidence of unholy monstrosities in Providence areaSlide15

He comes, oh god, he comes